/external/webrtc/webrtc/p2p/base/ |
relayport.cc | 50 // Validates a response to a STUN allocate request. 56 // Sends a STUN allocate request message to the relay server. 63 // already STUN intended for the server, so no wrapping is necessary. 75 // packet in a STUN send / data indication. 99 // Sends the STUN requests to the server to initiate this connection. 108 // entry. This will wrap the packet in STUN if necessary. 243 // This is due to as mapped address stun attribute is used for allocated 567 // Otherwise, we must wrap the given data in a STUN SEND request so that we 709 LOG(INFO) << "Incoming packet was not STUN"; 713 // The incoming packet should be a STUN ALLOCATE response, SEND response, o [all...] |
stun.cc | 11 #include "webrtc/p2p/base/stun.h" 128 // Verifies a STUN message has a valid MESSAGE-INTEGRITY attribute, using the 137 // Getting the message length from the STUN header. 143 // Finding Message Integrity attribute in stun message. 178 // Stun message has other attributes after message integrity. 179 // Adjust the length parameter in stun message to calculate HMAC. 184 // Writing new length of the STUN message @ Message Length in temp buffer. 188 // |0 0| STUN Message Type | Message Length | 245 // Verifies a message is in fact a STUN message, by performing the checks 302 // and version is always 2 (10). If set, this is not a STUN packet [all...] |
relayserver.h | 19 #include "webrtc/p2p/base/stun.h" 99 // Processes the relevant STUN request types from the client. 153 // Sends a STUN message to the connected client with no wrapping.
|
relayserver.cc | 45 // Sends the given STUN message on the given socket. 54 // Constructs a STUN error response and sends it on the given socket. 190 // If this did not come from an existing connection, it should be a STUN 200 // Handle STUN requests to the server itself. 249 // The first packet should always be a STUN / TURN packet. If it isn't, then 254 LOG(LS_WARNING) << "Dropping packet: first packet not STUN"; 300 // Parse this into a stun message. Eat the message if this fails. 327 // Make sure this is a valid STUN request. 387 // Make sure this is a valid STUN request.
|
stunserver.cc | 30 // Parse the STUN message; eat any messages that fail to parse.
|
turnport.cc | 16 #include "webrtc/p2p/base/stun.h" 27 // TODO(juberti): Move to stun.h when relay messages have been renamed. 157 // This will wrap the packet in STUN if necessary. 356 // TCP port is ready to send stun requests after the socket is connected, 401 state_ = STATE_CONNECTED; // It is ready to send stun requests. 458 // A TURN port will have two candiates, STUN and TURN. STUN may not 459 // present in all cases. If present stun candidate will be added first 541 // This is to guard against a STUN response from previous server after 571 "Ignoring STUN binding response message on shared socket." [all...] |
basicpacketsocketfactory.cc | 14 #include "webrtc/p2p/base/stun.h" 163 // Finally, wrap that socket in a TCP or STUN TCP packet socket.
|
stunrequest.cc | 129 // Parse the STUN message and continue processing as usual. 134 LOG(LS_WARNING) << "Failed to read STUN response " << rtc::hex_encode(id);
|
stunrequest_unittest.cc | 156 LOG(LS_INFO) << "STUN request #" << (i + 1) 175 rtc::Thread::Current()->ProcessMessages(10000); // > STUN timeout
|
port_unittest.cc | 97 // Stub port class for testing STUN generation and processing. 167 // in STUN binding requests. 536 case NAT_OPEN_CONE: return "stun(open cone)"; 537 case NAT_ADDR_RESTRICTED: return "stun(addr restricted)"; 538 case NAT_PORT_RESTRICTED: return "stun(port restricted)"; 539 case NAT_SYMMETRIC: return "stun(symmetric)"; 540 default: return "stun(?)"; [all...] |
stunserver_unittest.cc | 108 "look anything like a normal stun message";
|
testturnserver.h | 18 #include "webrtc/p2p/base/stun.h"
|
stun_unittest.cc | 13 #include "webrtc/p2p/base/stun.h" 67 // Returns the size the stun message should report itself as being 76 // Sample STUN packets with various attributes 211 // The actual length in bytes of the invalid messages (including STUN header) 247 // RTCP packet, for testing we correctly ignore non stun packet types. 257 // Software name (request): "STUN test client" (without quotes) 264 static const char kRfc5769SampleMsgClientSoftware[] = "STUN test client"; 595 // Read the RFC5389 fields from the RFC5769 sample STUN request. 623 // Read the RFC5389 fields from the RFC5769 sample STUN response. 646 // Read the RFC5389 fields from the RFC5769 sample STUN response for IPv6 [all...] |
p2ptransportchannel_unittest.cc | 72 // The address of the public STUN server. 120 // We also run a STUN server and a relay server on the virtual network to allow 454 // local to stun based on the test type. 458 // i.e. when don't match its remote type is either local or stun. [all...] |
tcpport.cc | 17 * - Writable: Whether the stun binding is completed. Sending a data packet 18 * before stun binding completed will trigger IPC socket layer to shutdown 53 * | | Stun Binding Completed | 58 * 1 -----------+ 2 -----------+Stun 3 -----------+ 371 // Process the STUN response before we inform upper layer ready to send.
|
transport.h | 100 bool writable; // Has this connection received a STUN response? 104 size_t rtt; // The STUN RTT for this connection.
|
turnport.h | 39 STATE_CONNECTED, // Socket connected, ready to send stun requests. 213 // Stun address from allocate success response.
|
/external/webrtc/webrtc/p2p/client/ |
basicportallocator.cc | 326 // during stun process. 778 // Already got this STUN servers covered. 896 // If shared socket is enabled, STUN candidate will be allocated by the 902 // If STUN is not disabled, setting stun server address to port. 906 << "STUN candidate generation."; 938 LOG(LS_VERBOSE) << "AllocationSequence: STUN ports disabled, skipping."; 948 << "AllocationSequence: No STUN server configured, skipping."; [all...] |
basicportallocator.h | 222 // Returns addresses of both the explicitly configured STUN servers, 223 // and TURN servers that should be used as STUN servers.
|
/external/webrtc/webrtc/p2p/stunprober/ |
stunprober.cc | 24 #include "webrtc/p2p/base/stun.h" 41 // STUN servers 46 // Actual time the STUN bind request was sent. 51 // Server reflexive address from STUN response for this given request. 153 // The write must succeed immediately. Otherwise, the calculating of the STUN 176 // Invalid or incomplete STUN packet.
|
/external/webrtc/talk/app/webrtc/ |
peerconnection_unittest.cc | 774 ice_server.uri = "stun:stun.l.google.com:19302"; [all...] |
peerconnection.cc | 79 // The default stun port. 85 static const char* kValidIceServiceTypes[] = {"stun", "stuns", "turn", "turns"}; 90 STUN = 0, // Indicates a STUN server. 91 STUNS, // Indicates a STUN server used with a TLS session. 137 // stunURI = scheme ":" stun-host [ ":" stun-port ] 138 // scheme = "stun" / "stuns" 139 // stun-host = IP-literal / IPv4address / reg-name 140 // stun-port = *DIGI [all...] |
/external/webrtc/webrtc/base/ |
natserver.h | 53 // then sending the remote address in quasi-STUN format. The connection status
|
/external/webrtc/talk/app/webrtc/test/ |
peerconnectiontestwrapper.cc | 93 ice_server.uri = "stun:stun.l.google.com:19302";
|
/external/webrtc/talk/app/webrtc/objc/public/ |
RTCPeerConnection.h | 102 // Any changes to STUN/TURN servers or ICE candidate policy will affect the
|